Wire Mode is a deployment option where the SonicWall appliance can be deployed as a Bump in the Wire. It provides a least-intrusive way to deploy the appliance in a network.
Wire Mode is very well suited for deploying behind a pre-existing Stateful Packet Inspection (SPI) Firewall. Wire Mode is a simplified form of Layer 2 Bridge Mode. A Wire Mode interface does not take any IP address and it is typically configured as a bridge between a pair of interfaces. None of the packets received on a Wire Mode interface are destined to the firewall, but are only bridged to the other interface.
Wire Mode operates in one of 4 different modes
Bypass Mode | Bypass Mode allows for the quick and relatively non-interruptive introduction of firewall hardware into a network. Upon selecting a point of insertion into a network (e.g. between a core switch and a perimeter firewall, in front of a VM server farm, at a transition point between data classification domains), the firewall is inserted into the physical data path, requiring a very short maintenance window. One or more pairs of switch ports on the firewall are used to forward all packets across segments at full line rates, with all the packets remaining on the firewall's 112 Gbps switch fabric rather than getting passed up to the multi-core inspection and enforcement path. While Bypass Mode does not offer any inspection or firewalling, this mode allows the administrator to physically introduce the firewall into the network with a minimum of downtime and risk, and to obtain a level of comfort with the newly inserted component of the networking and security infrastructure. The administrator can then transition from Bypass Mode to Inspect or Secure Mode instantaneously through a simple user-interface driven reconfiguration. |
Inspect Mode | Inspect Mode extends Bypass Mode without functionally altering the low-risk, zero latency packet path. Packets continue to pass through the firewall's switch fabric, but they are also mirrored to the multi-core RF-DPI engine for the purposes of passive inspection, classification, and flow reporting. This reveals the firewall's Application Intelligence and threat detection capabilities without any actual intermediate processing. |
Secure Mode | Secure Mode is the progression of Inspect Mode, actively interposing the firewall's multi-core processors into the packet processing path. This unleashes the inspection and policy engines' full-set of capabilities, including Application Intelligence and Control, Intrusion Prevention Services, Gateway and Cloud-based Anti-Virus, Anti-Spyware, and Content Filtering. Secure Mode affords the same level of visibility and enforcement as conventional NAT or L2 Bridged Mode deployments, but without any L3/L4 transformations, and with no alterations of ARP or routing behavior. Secure Mode thus provides an incrementally attainable NGFW deployment requiring no logical and only minimal physical changes to existing network designs. |
Tap Mode | Tap Mode provides the same visibility as Inspect Mode, but differs from the latter in that it ingests a mirrored packet stream via a single switch port on the firewall, eliminating the need for physically intermediated insertion. Tap Mode is designed for use in environments employing network taps, smart taps, port mirrors, or SPAN ports to deliver packets to external devices for inspection or collection. Like all other forms of Wire Mode, Tap Mode can operate on multiple concurrent port instances, supporting discrete streams from multiple taps. |
The following table summarizes the key functional differences between modes of interface configuration:
Bypass Mode | Inspect Mode | Secure Mode | Tap Mode | L2 Bridge, Transparent, NAT, Route Modes | |
ARP/Routing/NAT a | No | No | No | No | Yes |
Comprehensive Anti-Spam Service a | No | No | No | No | Yes |
Content Filtering | No | No | Yes | No | Yes |
DHCP Server a | No | No | No | No | Yes b |
DNS Filtering | No | No | No | No | Yes |
DPI Detection | No | Yes | Yes | Yes | Yes |
DPI Prevention | No | No | Yes | No | Yes |
DPI-SSL a | No | No | Yes e | No | Yes |
High-Availability | Yes | Yes | Yes | Yes | Yes |
Link-State Propagation c | Yes | Yes | Yes | No | No |
SPI | No | Yes | Yes | Yes | Yes |
TCP Handshake Enforcement d | No | No | No | No | Yes |
Virtual Groups a | No | No | No | No | Yes |
NOTE: DNS Filtering is supported on L2 Bridge mode.
Note: When operating in Wire Mode, the firewall's dedicated Management interface will be used for local management. To enable remote management and dynamic security services and application intelligence updates, a WAN interface (separate from the Wire Mode interfaces)
must be configured for Internet connectivity. This is easily done given that SonicOS supports interfaces in mixed-modes of almost any combination.
This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
To configure an interface for Wire Mode, perform the following steps:
Note: Only unassigned interfaces are available in the Paired Interface pull-down menu. To make an interface unassigned, click on the Configure button for it, and in the Zone pull-down menu, select Unassigned.
Configure for Bypass Mode
Bypass Mode allows for the quick and relatively non-interruptive introduction of the SonicWall into a network. Bypass Mode can be configured between a pair of interfaces. All traffic received is bridged to the paired interface. While Bypass Mode does not offer any inspection or firewalling, this mode allows the administrator to physically introduce the firewall into the network with a minimum of downtime and risk, and to obtain a level of comfort with the newly inserted component of the networking and security infrastructure.
How to configure:
In the screenshot below, X4 Interface has been configured in Bypass Mode and paired with X3 Interface.
Inspect Mode
Inspect Mode can be configured between a pair of interfaces. Packets continue to pass through the SonicWall to the paired interface, but they are also mirrored to the DPI engine for the purposes of passive inspection, classification, logging and flow reporting. There is full application threat detection and visualization, but no application control in Inspect Mode.
How to configure:
In the screenshot below, X2 Interface has been configured in Inspect Mode and paired with X6 Interface.
In Inspect Mode interesting traffic will be logged. For eg. if CFS or IPS Policies are defined to prevent specific traffic, the SonicWall will log them as blocked or prevented without actually doing so.
Secure Mode
Secure Mode is the progression of Inspect Mode, actively applying SonicWall Application Intelligence and Control, Intrusion Prevention Service, Gateway and Cloud-based Anti-Virus, Anti-Spyware and Content Filtering. Secure Mode affords the same level of visibility and enforcement as conventional NAT or L2 Bridge mode deployments, but without any L3/L4 transformations, and with no alterations of ARP or routing behavior. Secure Mode requires no logical, and only minimal physical, changes to existing network designs.
Secure Mode can be configured between a pair of interfaces. All traffic received is fully processed by the firewall. There is full application visualization and control in Secure Mode.
How to configure:
In the screenshot below, X2 Interface has been configured in Secure Mode and paired with X6 Interface.
Tap Mode
Tap Mode can be configured for a single interface. All traffic received is never sent out of the firewall, but the firewall performs full SPI and DPI processing. There is full application visualization, but no application control in Tap Mode. Typically, a mirror port is set up on the switch to mirror the network traffic to the firewall. Tap Mode provides the same visibility as Inspect Mode, but differs from the latter in that it ingests a mirrored packet stream via a single switch port on the SonicWall eliminating the need for physically intermediated insertion. Tap Mode is designed for use in environments employing network taps, smart taps, port mirrors, or SPAN ports to deliver packets to external devices for inspection or collection. Like all other forms of Wire Mode, Tap Mode can operate on multiple concurrent port instances, supporting discrete streams from multiple taps.
The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.
To configure an interface for Wire Mode, perform the following steps:
Note: Only unassigned interfaces are available in the Paired Interface pull-down menu. To make an interface unassigned, click on the Configure button for it, and in the Zone pull-down menu, select Unassigned.
Configure for Bypass Mode
Bypass Mode allows for the quick and relatively non-interruptive introduction of the SonicWall into a network. Bypass Mode can be configured between a pair of interfaces. All traffic received is bridged to the paired interface. While Bypass Mode does not offer any inspection or firewalling, this mode allows the administrator to physically introduce the firewall into the network with a minimum of downtime and risk, and to obtain a level of comfort with the newly inserted component of the networking and security infrastructure.
How to configure:
In the screenshot below, X3 interface has been configured in Bypass Mode and paired with X4 interface.
Inspect Mode
Inspect Mode can be configured between a pair of interfaces. Packets continue to pass through the SonicWall to the paired interface, but they are also mirrored to the DPI engine for the purposes of passive inspection, classification, logging and flow reporting. There is full application threat detection and visualization, but no application control in Inspect Mode.
How to configure:
In the screenshot below, X3 interface has been configured in Inspect Mode and paired with X4 interface.
In Inspect Mode interesting traffic will be logged. For eg. if CFS or IPS Policies are defined to prevent specific traffic, the SonicWall will log them as blocked or prevented without actually doing so.
Secure Mode
Secure Mode is the progression of Inspect Mode, actively applying SonicWall Application Intelligence and Control, Intrusion Prevention Service, Gateway and Cloud-based Anti-Virus, Anti-Spyware and Content Filtering. Secure Mode affords the same level of visibility and enforcement as conventional NAT or L2 Bridge mode deployments, but without any L3/L4 transformations, and with no alterations of ARP or routing behavior. Secure Mode requires no logical, and only minimal physical, changes to existing network designs.
Secure Mode can be configured between a pair of interfaces. All traffic received is fully processed by the firewall. There is full application visualization and control in Secure Mode.
How to configure:
In the screenshot below, X3 interface has been configured in Secure Mode and paired with X4 interface.
Tap Mode
Tap Mode can be configured for a single interface. All traffic received is never sent out of the firewall, but the firewall performs full SPI and DPI processing. There is full application visualization, but no application control in Tap Mode. Typically, a mirror port is set up on the switch to mirror the network traffic to the firewall. Tap Mode provides the same visibility as Inspect Mode, but differs from the latter in that it ingests a mirrored packet stream via a single switch port on the SonicWall eliminating the need for physically intermediated insertion. Tap Mode is designed for use in environments employing network taps, smart taps, port mirrors, or SPAN ports to deliver packets to external devices for inspection or collection. Like all other forms of Wire Mode, Tap Mode can operate on multiple concurrent port instances, supporting discrete streams from multiple taps.